Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Topic Area: Information Technology Sorted by: date

Displaying records 1 to 10 of 731 records.
Resort by: Date / Title

1. Demystifiying the Internet of Things
Topic: Information Technology
Published: 6/27/2016
Author: Jeffrey Mark Voas
Abstract: This short column introduces the need for a foundational science to the Internet of Things (IoT). It introduces the notion of primitives and elements, and their relationship to trustworthiness.

2. Metamorphic Testing for Cybersecurity
Topic: Information Technology
Published: 6/27/2016
Authors: Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey Mark Voas, Zhi Quan Zhou
Abstract: Testing is a major approach for the detection of software defects, including security vulnerabilities. This article introduces metamorphic testing (MT), a relatively new testing method, and discusses how the new perspective of MT can help to conduct ...

3. Derived PIV Application and Data Model Test Guidelines
Series: Special Publication (NIST SP)
Report Number: 800-166
Topic: Information Technology
Published: 6/6/2016
Authors: David A Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Steven Brady
Abstract: NIST Special Publication (SP) 800-157 contains technical guidelines for the implementation of standards-based, secure, reliable, interoperable Public Key Infrastructure (PKI)-based identity credentials that are issued for mobile devices by federal de ...

4. Extending Network Security into Virtualized Infrastructure
Series: ITL Bulletin
Report Number: June 2016
Topic: Information Technology
Published: 6/3/2016
Authors: Ramaswamy Chandramouli, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-125B, "Secure Virtual Network Configuration for Virtual Machine (VM) Protection." That publication provides an analysis of various virtual network configuration ...

5. Insights on Formal Methods of Cybersecurity
Topic: Information Technology
Published: 5/27/2016
Authors: Jeffrey Mark Voas, Kim Bernard Schaffer
Abstract: We asked 7 experts 1 simple question to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems: Please summarize in a paragraph the state of the research and practitioner communities in form ...

6. On various nonlinearity measures for boolean functions
Topic: Information Technology
Published: 5/19/2016
Authors: Rene C Peralta, Joan Boyar, Magnus G. Find
Abstract: A necessary condition for the security of cryptographic functions is to be "sufficiently distant" from linear, and cryptographers have proposed several measures for this distance. We show that six common measures, nonlinearity, algebraic degree, ann ...

7. Catalyzing the Internet of Things and Smart Cities: Global City Teams Challenge.
Topic: Information Technology
Published: 4/11/2016
Author: Sokwoo Rhee
Abstract: Many smart city and Internet of Things (IoT) solutions are suffering from fragmentation and lack of economies of scale. To address this issue, the National Institute of Standards and Technology (NIST) initiated the Global City Teams Challenge (GCTC) ...

8. Analysis of Virtual Networking Options for Securing Virtual Machines
Topic: Information Technology
Published: 3/20/2016
Author: Ramaswamy Chandramouli
Abstract: Virtual Machines (VMs) constitute the primary category of resources to be protected in virtualized infrastructures. Out of the two types of protection for VMs -- Host-level and Network-level -- it is the approaches for the Network-level protection th ...

9. Secure Virtual Network Configuration for Virtual Machine (VM) Protection
Series: Special Publication (NIST SP)
Report Number: 800-125B
Topic: Information Technology
Published: 3/7/2016
Author: Ramaswamy Chandramouli
Abstract: Virtual Machines (VMs) are key resources to be protected since they are the compute engines hosting mission-critical applications. Since VMs are end-nodes of a virtual network, the configuration of the virtual network forms an important element in th ...

10. Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations [including updates as of 01-14-2016]
Series: Special Publication (NIST SP)
Report Number: 800-171
Topic: Information Technology
Published: 1/21/2016
Authors: Ronald S Ross, Kelley L Dempsey, Patrick Viscuso, Mark Riddle, Gary Guissanie
Abstract: The protection of Controlled Unclassified Information (CUI) while residing in nonfederal information systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the federal government to successfull ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series